Fortinet

FortinetSecurity

FortiGuard Labs Telemetry – Roundup and Comparison of 2015 and 2016 IoT Threats

Credit to Author: Gavin Chow| Date: Mon, 06 Mar 2017 08:45:09 -0800

Attacks targeting and originating from IoT devices began grabbing news headlines toward the last quarter of 2016. Insecure IoT devices became the low-hanging fruit for threat actors to easily exploit. Some were even notoriously used as botnets to launch DDoS attacks against selected targets. For example, the infamous Mirai botnet exploited weak login vulnerabilities in insecure IoT devices such as IP cameras and home routers, and was responsible for one of the largest known DDoS attacks to date. Besides being used in DDoS attacks, exploited IoT…

Read More
FortinetSecurity

Byline: Is Your Healthcare Data Safe? Three Questions to Ask

Credit to Author: Susan Biddle| Date: Fri, 03 Mar 2017 07:20:08 -0800

In the all-out war for data, the healthcare industry is getting hit the hardest. Experian’s fourth annual 2017 Data Breach Industry Forecast states that healthcare organizations will be the most targeted sector for attack, with new and sophisticated attacks emerging. If healthcare organizations and their IT teams aim to keep data safe, they need to take a step back to assess the overall security landscape and the security processes currently in place on a macro level.

Read More
FortinetSecurity

Byline: Securing Your Growing Home Network

Credit to Author: Anthony Giandomenico| Date: Thu, 02 Mar 2017 07:45:18 -0800

For the enterprise, we recommend a three phase approach to security based around learning what is on your network, dividing the network into separated segments, and then implementing appropriate security that provides critical protections without compromising functionality and interoperability.

Read More
FortinetSecurity

Dot Ransomware: Yet another Commission-based Ransomware-as-a-Service

Credit to Author: Rommel Joven| Date: Thu, 02 Mar 2017 06:54:42 -0800

Dot ransomware is a new Ransomware-as-a-service(RaaS) that is openly available in hacking forums. And following the current trend in malware services, it uses web portals hosted in the TOR network for anonymity. Commission-based Profit While lurking in hacking forums, we came across a post for this new ransomware service. RaaS services are now switching from a one-time fee or subscription payment model to a commission based strategy. One advantage of this scheme is that the up front price for the ransomware is free, and any profits realized…

Read More